Secure, HIPAA-Compliant Email

HIPAA Compliant Email Where Big Attachments are No Big Deal.™

Speed up the way you share patient records. There’s no need to split large image files across multiple emails, send through snail mail or transfer to costly CDs. Just compose, drag, drop, and hit send.  Done. It's the easiest, safest and fastest way to get over your attachment issues and gain freedom in your clinical workflow.  

And, in a time when cybercrime, ransomware and phishing are more and more invasive, you need iCoreExchange’s fully HIPAA-compliant, cloud-based email to protect your patient and practice data whether it’s sitting in your inbox or sending to anyone else’s inbox.

  • Say goodbye to attachment issues. Unlike others, iCoreExchange lets you attach as many files as you want to any email with no size limits. Send your biggest X-rays and images all day long
  • Don’t be Phish Bait. Cybercriminals target emails to steal information and hold practices for ransom. No iCoreExchange email has been spammed or phished. Ever!
  • Skip after-hours trips to the office. Review and send patient records securely from anywhere, anytime. iCoreExchange is cloud-based, so your location doesn’t matter
  • Keep your “fax” straight. There are too many ways that faxing leads to straight-up HIPAA violations. The guaranteed legal way to send PHI is through fully HIPAA-compliant email
  • Who are you referring to? iCoreExchange has a built-in referral network so you have instant access to qualified providers. Give referrals. Get referrals. Stay connected

Member Benefit Information:

VDA members receive a 35% discount off the regular monthly price.  That’s only $22.50 per month per provider.

Check out iCoreExchange. Book a live online demo.

iCoreExchange Logo Footer

Articles from iCore​Exchange

Phishing is a Curable Disease

“Ransomware reigns supreme in 2018, as phishing attacks continue to trick employees…A criminal only needs one victim to click on their malicious link or download to gain access to an organization.”  TechRepublic[1]

Malware.  We’re calling it the most significant disease that can infect your practice. First let’s start with some simple definitions:

  • Malware is quite literally any software that’s operating on your system with malicious intent.   
  • Ransomware is malware that criminals use to hold your data or system hostage until you pay a ransom.  And if you pay, they may or may not release it.
  • “Phishing” comes in different forms.   It is most commonly seen when criminals use email to get their malware into your system.  This could be as simple as an attached Word document, a malicious link, or even someone posing as IT staff.

So why go to all the trouble?  As you might imagine, it all comes down to money.  The data sitting at your dental practice turns out to be very valuable to those who operate in a shadow economy.  In fact, far more valuable than stolen credit card data.

For example, consider a retail store that runs hundreds of credit cards per day… when their data is stolen, it is commanding around $8 to $12 per record. But for every health record stolen from your dental practice, criminals can get about $50 on the shadow market.[2] So the data in your hands is worth roughly quadruple straight credit card data.

These numbers have led the Health and Human Services Dept. (HHS) to issue extremely strong warnings:

“Healthcare, in general, is and has been the number one critical infrastructure sector to be targeted by cybercriminals… This virtually ensures any new attack will target healthcare organizations first and foremost.” HHS Report, April 12, 2018

So, let’s drill down to better understand how a typical ransomware attack might happen. While there are multiple ways, phishing is by far the most common... because it’s the easiest.

You only need one person in your practice or Dental Service Organization (DSO), to be tricked by an email that’s pretending to be something it’s not.

Again, this could be as simple as opening an attachment (even something as non-threatening as a PDF) or clicking on a link inside an email that either installs the malware or leads the user to a real-looking site that captures a username and password.

Once a single phishing attempt is successful with just one person in your organization, the malware goes into your system and begins its nefarious work.   Sometimes it sits dormant for a while. But sooner or later, it begins collecting information. And sometimes, it begins destroying your backup files.

Regardless, there are usually two options for what happens next:

  • The malware sends your data back to the cybercriminal.  This includes the actual Protected Health Information (PHI).  It may also include additional data that will help the criminals take further control of your system.  This could go on perpetually.
  • The other popular option is that the malware will lock you out of your entire system and post a ransom message.  This can often deny access to any computer in your practice. This is when you have officially entered the category of “ransomware.”  

Most typically, you’re asked to pay in Bitcoin so the funds are not trackable. Bitcoin is an electronic payment system that doesn’t go through a bank or other payment gateway.  We’ve seen ransom requests range from hundreds to hundreds-of-thousands of dollars. And we’re also seeing escalating ransoms. If you pay $10,000, they may up the ransom by another $20,000. And of course, this doesn’t even account for the HIPAA violations you’ll have to deal with later.

So, no matter how you slice it, you don’t want to encounter malware in your practice.   

How do you know if you are under a ransomware attack? The HHS list of indicators include[4]:

  • Users realizing that a link that was clicked on, a file attachment opened, or a website visited may have been malicious in nature
  • An increase in activity in the central processing unit (CPU) of a computer and disk activity for no apparent reason (due to the ransomware searching for, encrypting and removing data files)
  • An inability to access certain files as the ransomware encrypts, deletes and re-names and/or re- locates data; and
  • Detection of suspicious network communications between the ransomware and the attackers’ command and control server(s) (this would most likely be detected by IT personnel via an intrusion detection or similar solution).

More importantly, how do you prevent an attack from happening? HCCIC offers the following advice:[5]

  • Back up data regularly and use off-site servers for backup and storage
  • Secure your backups – ensure backups are not connected permanently to the computers and networks they are backing up. Backups are critical in ransomware recovery and response; if infected, a backup may be the best way to recover critical data.
  • Restrict access behind firewalls and the number of users who can log in to remote desktop applications
  • Train your staff to assist in detecting malicious software and how to report such detections
  • Conduct an annual vulnerability assessment
  • Use strong/unique username and passwords with two-factor authentication (2FA)
  • Limit users who can log in using remote desktop
  • Implement an account lockout policy to help thwart brute force attacks (set a maximum number of attempts before locking out the account)

These steps, along with the HIPAA-complaint practice management and email exchange systems will help prevent you from becoming the next victim to malware, ransomware or phishing.

iCoreConnect’s HIPAA-compliant email, iCoreExchange is actually unable to be phished.  Additionally, iCoreExchange is encrypted at the highest levels and all data is stored remotely. iCoreExchange has been vetted and endorsed by VDA Services.

Robert McDermott is Chief Executive Officer and President of iCoreConnect.  He leads the company’s innovative team of software developers, sales and technology veterans.  iCoreConnect creates communication and practice management software that allows professionals to share information at the highest levels of security, backed up with real customer service.